Beruflich Dokumente
Kultur Dokumente
10 | January 2015
Cover Story
Cloud Computing: A Paradigm
Shift in IT Infrastructure 7
www.csi-india.org
Cover Story
Web-Scale IT: Solution for
Managing Enterprise IT
Infrastructure Challenges 11
Research Front
Innovations in India
Network Biology: A New Way to Software Product Engineering
Understand Complex Disease Maturity Model 30
and Future of Medicine 20
Security Corner
A Case Study of Lemons
& Melons Inc. 34
Security Corner
Trolls, Trolling & Cyber
Law 36
CSI Communications | January 2015 | 1
CSI-2014 the Computer Society of Indias the 49th Annual Convention and International Conference on Emerging ICT for Bridging Future was held from
12-12-2014 to 14-12-2014 at JNTU Hyderabad.
The Convention was held in association with JNTU and DRDO. Government of Telangana State, DRDO and JNTU have partnered the event. The Conference
was well attended and it was a festival of feasts from the best Technical Sessions.
2.
3.
4.
Inaugural Session with Chief Guest Mr. Rajeev Sharma Chief Secretary Telangana State
Presided by Mr. Mahaliingam, Past President CSI, Guest of Honor Dr. Piyush Gupta,
Chairman CSI SIGeGov.Welcome address: Mr. JA Chowdary, OC.
Digital Telangana The Road Ahead Session: chaired by Mr. AS Samesh Director IT
Telangana State. Moderator: Dr. Ashok Agarwal; Panelists: Prof.MP Gupta, IIT Delhi;
Mr. Biju Kadapurath, PWC
eGov 2.0 Session: Chaired by Dr. Jaijeet Bhattacharya, KPMG
Panelists: Prof. Ajit Rangnekar, ISB Hyderabad, Mr. Lalith S. Choudary Director CISCO.
Integrating eGovernance Applications, Chaired by Dr. Sateesh Reddy, Director rci.
Moderator: Dr Srinath Chakravarthy Vice President NISG, Panelists: Mr Mohd Y Sarulla,
Director KSITM, Mr Thomas Mathew Vice President SAP, Mr Arpan Bansal, Newgen.
K Mohan Raidu
Convention Convenor & KSS
Coordinator
Inaugurating the Summit, Telangana State Chief Secretary Rajeev Sharma urged IT Professionals to
partner the state as it seeks to retain the predominance in e-governance enjoyed by erstwhile Andhra
Pradesh.
The need, he said, is to take IT initiatives closer to the people at nominal costs and to make them user
friendly. eGovernance was the only answer if the thrust is on efficient and corruption free service
delivery for the citizens.
He said the Data Security was a major concern for the state government due to the rise in instances of
Dr Rajeev Sharma
Chief Secretary, Telangana State cybercrimes in the country.
Director Communications in IT, Electronics and Communications Department AS Ramesh said,
Telangana Government wants the Central Project of providing broadband connectivity to all gram
panchayats implemented across the State at one go since that would provide people greater
access to e-Governance initiatives as also help avoid delays on account of a phased rollout. The
Centre's response to the request is awaited.
National Cyber Security Policy 2013 estimates the need for ve lakh cyber security professionals
and the state wants to impart cyber security training to as many engineering students as possible.
AS Ramesh
Director IT, Govt of Telangana
Keynote Address of day was delivered E Sridharan, popularly known as Metro Man.
Swamy Bhoomananda Thirtha has spoken on Inner Management of Human Excellence.
Paper presentation and Tutorials were held at UGC Auditorium in parallel Sessions
Day 2 : 13-12-2014
Dr. S S Mantha (Chairman, AICTE) has delivered Key Note Address on (Digital India - Opportunities and Challenges Ahead).
First session was on Cloud Computing Technologies & Strategies for Business, for which the moderator was Mr. Chandra Shekar Babu
Talluri (VP, OTSI) and the panelists were, Mr. Yogesh Sawant (Director, Partner Sales & Field Alliance Organisation, India, Hitachi Data
Continued on Page C
CSI Communications
Contents
Volume No. 38 Issue No. 10 January 2015
Editorial Board
Chief Editor
Dr. R M Sonar
Editors
Dr. Debasish Jana
Dr. Achuthsankar Nair
Resident Editor
Mrs. Jayshree Dhere
Cover Story
7
11
13
Technical Trends
17
20
Articles
23
25
Please note:
CSI Communications is published by Computer
Society of India, a non-prot organization.
Views and opinions expressed in the CSI
Communications are those of individual authors,
contributors and advertisers and they may
differ from policies and official statements of
CSI. These should not be construed as legal or
professional advice. The CSI, the publisher, the
editors and the contributors are not responsible
for any decisions taken by readers on the basis of
these views and opinions.
Although every care is being taken to ensure
genuineness of the writings in this publication,
CSI Communications does not attest to the
originality of the respective authors content.
2012 CSI. All rights reserved.
Instructors are permitted to photocopy isolated
articles for non-commercial classroom use
without fee. For any other copying, reprint or
republication, permission must be obtained
in writing from the Society. Copying for other
than personal use or internal reference, or of
articles or columns not owned by the Society
without explicit permission of the Society or the
copyright owner is strictly prohibited.
29
S Palani Murugan
Programming.Tips()
Fun with C++ Programs Exploring
Function Calls While using the
Ternary Operator
Wallace Jacob
Innovations in India
30
Practitioner Workbench
Dr. Prema K V
Research Front
Published by
Executive Secretary
Mr. Suchit Gogwekar
For Computer Society of India
28
Security Corner
32
Information Security
A Security Solution for Rogue Wi-Fi
Access Point
Hemant Kumar Saini
34
36
IT Act 2000
Trolls, Trolling & Cyber Law
Prashant Mali
PLUS
Brain Teaser
38
Happenings@ICT
H R Mohan
39
CSI Reports
40
CSI Report
41
CSI News
42
Published by Suchit Gogwekar for Computer Society of India at Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093.
Tel. : 022-2926 1700 Fax : 022-2830 2133 Email : hq@csi-india.org Printed at GP Offset Pvt. Ltd., Mumbai 400 059.
Vice-President
Prof. Bipin V Mehta
vp@csi-india.org
Hon. Secretary
Mr. Sanjay Mohapatra
secretary@csi-india.org
Hon. Treasurer
Mr. Ranga Rajagopal
treasurer@csi-india.org
Region - I
Mr. R K Vyas
Delhi, Punjab, Haryana, Himachal
Pradesh, Jammu & Kashmir,
Uttar Pradesh, Uttaranchal and
other areas in Northern India.
rvp1@csi-india.org
Region - II
Mr. Devaprasanna Sinha
Assam, Bihar, West Bengal,
North Eastern States
and other areas in
East & North East India
rvp2@csi-india.org
Region - III
Prof. R P Soni
Gujarat, Madhya Pradesh,
Rajasthan and other areas
in Western India
rvp3@csi-india.org
Region - V
Mr. Raju L kanchibhotla
Karnataka and Andhra Pradesh
rvp5@csi-india.org
Region - VI
Dr. Shirish S Sane
Maharashtra and Goa
rvp6@csi-india.org
Region - VII
Mr. S P Soman
Tamil Nadu, Pondicherry,
Andaman and Nicobar,
Kerala, Lakshadweep
rvp7@csi-india.org
Division-IV : Communications
(2014-16)
Dr. Durgesh Kumar Mishra
div4@csi-india.org
Regional Vice-Presidents
Division Chairpersons
Region - IV
Mr. Hari Shankar Mishra
Jharkhand, Chattisgarh,
Orissa and other areas in
Central & South
Eastern India
rvp4@csi-india.org
Chairman
Member
Member
Member
Member
Member
Member
Member
Member
Member
Member
Member
http://www.csi-india.org/about-csi
http://www.csi-india.org/web/guest/structureandorganisation
http://www.csi-india.org/executive-committee
http://www.csi-india.org/web/guest/nominations-committee
http://www.csi-india.org/web/guest/statutory-committees
http://www.csi-india.org/web/guest/who-s-who
http://www.csi-india.org/web/guest/csi-fellows
http://www.csi-india.org/web/guest/104
http://www.csi-india.org/web/guest/collaborations
http://www.csi-india.org/distinguished-speakers
http://www.csi-india.org/web/guest/divisions
http://www.csi-india.org/web/guest/regions1
http://www.csi-india.org/web/guest/chapters
http://www.csi-india.org/web/guest/policy-guidelines
http://www.csi-india.org/web/guest/student-branches
http://www.csi-india.org/web/guest/membership-service
http://www.csi-india.org/web/guest/upcoming-events
http://www.csi-india.org/web/guest/publications
http://www.csi-india.org/web/education-directorate/student-s-corner
http://www.csi-india.org/web/guest/csi-awards
http://www.csi-india.org/web/guest/csi-certification
http://www.csi-india.org/web/guest/upcoming-webinars
http://www.csi-india.org/web/guest/about-membership
http://www.csi-india.org/why-join-csi
http://www.csi-india.org/membership-benefits
http://www.csi-india.org/membership-schemes-baba-scheme
http://www.csi-india.org/special-interest-groups
http://www.csi-india.org/fee-structure
http://www.csi-india.org/web/guest/174
http://www.csi-india.org /web/guest/institiutionalmembership
http://www.csi-india.org/web/guest/become-a-member
http://www.csi-india.org/web/guest/183
http://www.csi-india.org/web/guest/downloadforms
http://www.csi-india.org/web/guest/membership-eligibility
http://www.csi-india.org/web/guest/code-of-ethics
http://www.csi-india.org/web/guest/president-s-desk
http://www.csi-india.org/web/guest/csi-communications
http://www.csi-india.org/web/guest/csi-communicationshtml-version
http://www.csi-india.org/web/guest/journal
http://www.csi-india.org/web/guest/enewsletter
http://www.csi-india.org/csic-chapters-sbs-news
http://www.csi-india.org/web/education-directorate/home
http://www.csi-india.org /web/national-studentscoordinators/home
http://www.csi-india.org/web/guest/251
http://www.csi-india.org/web/guest/e-governanceawards
http://www.csi-india.org/web/guest/csiitexcellenceawards
http://www.csi-india.org/web/guest/csiyitp-awards
http://www.csi-india.org/web/guest/csi-service-awards
http://www.csi-india.org/web/guest/academic-excellenceawards
http://www.csi-india.org/web/guest/contact-us
www.csi-india.org
Presidents Message
H R Mohan
From
: Presidents Desk:: president@csi-india.org
Subject : President's Message
Date
: 1st January 2015
Dear Members
At the outset, let me wish you all a HAPPY NEW YEAR 2015. May
this New Year 2015 be: A Year of Health & Happiness; A Year of Peace &
Prosperity; A Year of Wealth & Wisdom; A Year of Glee & Glow; And also A
Year of Love & Laughter.
The ag ship event, our annual convention CSI-2014 and the Golden
Jubilee celebrations recently held at Hyderabad during 12-14 Dec 2014 were
really memorable. The participation of Shri Ravi Shankar Prasad, Minister for
Communications & IT and Law & Justice, Govt. of India and Shri K.T. Rama
Rao, Minister for Panchayat Raj and IT, Govt. of Telengana at the inaugural
session and the presence of Shri Y.S. Chowdary, Minister of State, Science
& Technology and Earth Science, Govt. of India and Shri CH Malla Reddy,
Member of Parliament at the valedictory session added strength to the
vision and mission of CSI. The other events at the convention - Knowledge
Sharing Sessions on eGovernance, CSI Nihiliant eGovernance Awards
Presentation, Tutorials on state of the art technologies, Special sessions,
Keynote addresses, Convention theme related sessions, Contributed paper
presentations were well attended and appreciated by the delegates. An
exhibition which was also a part of this convention attracted the delegates.
CSI-2014, being one of the conventions during the Golden Jubilee period had
a good participation, exceeding 700, from all over the country.
The CSI HQ based events such as National Council meeting, Annual
General Body Meeting, Auditor-Chapter Reps Meeting, Regional/Divisional/
Chapter Meeting were well participated and had good interactions. At the
inaugural session, Life Time Achievement Awards, Honorary Fellowship and
Fellowship Awards were presented to our senior members for their services to
the Computer Society of India and accomplishments in the IT eld. In the CSI
awards function held immediately after the AGM, Service Awards and Academic
Awards were presented recognizing the services of the volunteers who are the
pillars of the society at large. Our congratulations to all the award winners and
sincere thanks for their efforts in organizing various activities at the chapters and
student branches. The release of the Compendium Envisioning a Digital India
Selected eGovernance initiatives 2014, Proceedings of the contributed papers
and a Coffee Table Book of CSI Hyderabad at CSI-2014 deserve special mention.
In this years Think Tank Meeting of CSI Fellows, around 50 fellows participated
and deliberated on the Past, Present and the Future of CSI. The wish list, short
and long term action plans will be shared in the next message. A detailed report
on CSI-2014 will be featured in CSI Communications and also be posted at the
CSI website.
On behalf of CSI Execom and my personal behalf, I wish to place on record
our sincere thanks to the support extended by Jawaharlal Nehru Technological
University (JNTU), Hyderabad. Defense Research Development Organization
(DRDO) and various sponsors for the successful conduct of CSI-2014. Our
appreciation and special thanks to Mr. J.A. Chowdary (OC), Dr. A. Govardhan
(PC) and Mr. Gautam Mahapatra (FC), Mr. Raju L Kanchibhotla (RVP-5), Mr.
Mohan Raidu (CSI-2014 Convener), Dr. Piyush Gupta (CSI SIG eGov) and the
members of the Team CSI Hyderabad, CSI fellows, CSI members, academic and
industry professionals from Hyderabad, delegates from all over the country for
making CSI-2014 a memorable convention.
The Annual Students Convention originally planned to be held prior
to CSI-2014 on 10-11, Dec 2014 at GNIT campus on the theme Campus
to Corporate and Beyond had to be postponed due to the university
examinations and the same will be held on 3-4, Jan 2015 and is being hosted
by Guru Nanak Institutions under the chairmanship of Dr. H.S. Saini. We are
thankful to Shri E.S.L. Narasimhan, Governor of Andhra Pradesh & Telengana
for consenting to inaugurate the convention and Shri K.T. Rama Rao, Minister
for Panchayat Raj and IT, Govt. of Telengana and Shri Bandaru Dattatreya,
Union Labour Minister, Govt. of India for consenting to be our guests at the
valedictory session.
I had the opportunity of participating in EAIT-2014, the 4th edition
of the International Conference on Emerging Applications of Information
Technology, organized by CSI Kolkata and held during 19-21 Dec 2014 at
Indian Statistical Institute with the technical co-sponsorships from IEEE CS,
IEEE TC-S&P, IEEE TC-CLS, BITS(Mesra) and ISI. This event is well known
for its technical content and quality of papers presented. Out of 271 papers
received, 63 were selected for oral presentation in parallel sessions. The
invited talks, keynote address and plenary talk highlighted the trends in ICT
areas. The conference proceedings edited by Dr. Debasish Jana and Dr.
Pinakpani Pal and published by IEEE CS CPS will soon be made available on
CSI Digital Library for access by our members. At the concluding session, I
was fortunate to present the CSI Life Time Achievement Award to Professor
Dwijesh Kumar Dutta Majumder, a founding member of CSI and a recipient
of the Norbert Wiener Award. On 21st Dec 2014 evening, the CSI Kolkata
Chapter had organized the Golden Jubilee celebrations and honoured the
veterans of CSI Kolkata. As Kolkata has a special place in Indian computing
and establishing the CSI, I had requested the senior members of CSI Kolkata
to contribute for the CSI History project which is looking for inputs from all
chapters, senior members and fellows.
The estimated 300 million Internet users and 200 million smartphone
users make the eCommerce scene in India quite exciting. The current (2014)
online shopping market of $3.5 billion is expected to grow to $6 billion in
2015 with the increase of online shoppers from 40 million to 65 million.
Flipkart on 6th Oct 2014 received one billion hits and achieved a sales of
$100 million. The Great Online Shopping Festival (GOSF) held during 10-12
Dec 2014 had 450 online retailers and clocked over 7 million unique visitors.
The Indian eCommerce ventures received funding to the tune of $3 billion
in the year 2014. Amazon has announced its intention to invest $2 billion
in Amazon India. IT czars like Ratan Tata, NRN Murthy, Azim Premji have
started investing in eCommerce ventures. Flipkart started in 2007 with an
investment of just four lakh rupees (about $6700) is now valued at $11 billion.
The IPO of Alibaba - the Chinese eCommerce giant (started in 1999 with a
capital of $60,000) had raised $25 billion in US and valued at $231 billion on
debut. These are some indications that the future is bright to this segment
of consumer internet companies. The eCommerce apart from offering
convenient shopping experience has the potential of making our Indian
products reach global markets; increase job potential; and spur growth in
the logistics sector. With all such excitements, this sector has attracted the
attention of the Government to draw up a regulatory framework. In all, it is
worth watching the trends in this sector.
The CSI Education Directorate is continuing its efforts in training
programmes. Recently it had organized workshops on Mobile Security,
Programming in PHP, Punarjjani workshop for special educators at
Coimbatore. They have also participated and put-up stalls for membership
drive during CeBIT India expo at Bangalore and during CSI-2014 at
Hyderabad.
It may be of interest to note that Vel Tech Dr. RR & Dr. SR Technical
University (VTU), Chennai which has an active student branch of CSI has a
full-edged eWaste recycling unit of one tonne per day capacity. VTU has
volunteered to work with CSI in creating awareness in eWaste recycling and
train entrepreneurs to set up similar units with funding from Govt. agencies.
Also its Research Park and Incubation Centre is willing to support innovative
projects and provide facilities. VTU is planning to conduct training
programmes during 2015 Jan and Feb and those interested may look forward
to announcements through CSI.
I request members to encourage the school children and college
students to participate in the Essay Contest on the theme Harnessing the
Power of ICT for our New Initiatives announced by CSI Chennai chapter and
IEEE CS & PCS Madras. For details, please visit http://goo.gl/FziCmK
I am happy to inform that the 15% Golden Jubilee discount to enroll
as Life Members in CSI has been extended till March 2015 based on the
requests received from various quarters. Please encourage your colleagues
and contacts to avail this opportunity and become members of CSI.
With best regards
H.R. Mohan
President
Computer Society of India
Editorial
One can safely say that cloud computing can eventually become a
panacea for all pain areas of IT managers irrespective of size of IT that
they are managing. With unprecedented increase in communication
infrastructure and availability of bandwidth to everyone assures
24x7 connectivity to remote infrastructure irrespective of wherever
it may be located in the world. Presence of big players like Microsoft,
Amazon and Google along with their massive investments in building
cloud infrastructure world-wide would make sure that computing and
storage would be available to everyone similar to other utility services
like electricity. To make readers aware of what is happening on ITI side
we are covering a related theme of IT Infrastructure in Jan 2015 issue.
We have two contributions under Cover Story section - the rst
one Cloud Computing: A Paradigm Shift in IT Infrastructure by
Debranjan Pal, Sourav Chakraborty and Amitava Nag, Assistant
Professors from Academy of Technology, West Bengal University of
Technology, Hooghly describing the signicance of cloud computing
in IT industries, its benets and various models. Authors also compare
different public cloud service providers on various parameters. In
second contribution for Cover Story section, Prof. Prerna Lal, Lecturer,
Information Management, International Management Institute, New
Delhi writes on new buzzword called Web-Scale IT, introduced by
Gartner, which is gaining attention from the rms and businesses.
She talks about key characteristics and benets of Web-scale IT for
enterprises to address IT challenges such as complexity and scale.
The contribution in Technical Trends section is about Impact of Cloud
Computing on the Conventional IT Infrastructure, by Dr. Prema K V,
Professor, Dept. of CSE, Manipal Institute of Technology, Manipal.
Under Research Front we have two contributions the rst one about
Adopting Cloud way for IT Needs Issues and Challenges by Prof (Dr.)
D G Jha, Professor and Ms. Kimaya Ambekar Academic AssociateIT, K J Somaiya Institute of Management Studies and Research,
Vidyavihar, Mumbai focussing on IaaS and business challenges
on adopting cloud; and the second contribution by Dr. Khalid Raza,
Assistant Professor, Department of CS, Jamia Millia Islamia (Central
One can safely say that cloud computing can eventually become a panacea
for all pain areas of IT managers irrespective of size of IT that they are
managing. With unprecedented increase in communication infrastructure
and availability of bandwidth to everyone assures 24x7 connectivity to
remote infrastructure irrespective of wherever it may be located in the
world. Presence of big players like Microsoft, Amazon and Google along
with their massive investments in building cloud infrastructure world-wide
would make sure that computing and storage would be available to everyone
similar to other utility services like electricity.
www.csi-india.org
Cover
Story
Internet Computing
Dening Cloud in IT
According to the U.S. National Institute
of Standards and Technology (NIST)[1],
Cloud is a classical model which enable
omnipresent, convenient, on-demand
network access to a publicly accessible
pool of congurable resources like
servers, storage, network components,
Public Cloud
Private Cloud
Hybrid Cloud
Community Cloud
Description
Hybrid
cloud
is
a
heterogeneous
distributed
system,
resulting from a private
cloud, which incorporates
different types of services
and resources from public
clouds.
Scalability
Very High
Limited
Very High
Limited
Reliability
Moderate
Very High
Medium to High
Very High
Security
Secure
Secure
Performance
Totally Depends
service provider
Low to medium
Good
Good
Very Good
Cost
Cheaper
High Cost
Costly
Costly
Examples
VMWare,
KVM, Xen
IBM,
HP,
VMWare
vCloud, Eucalyptus
on
Microsoft,
www.csi-india.org
Amazon[5][7]
Parameters
Microsoft[9]
Google[9]
1. Cloud platform[6]
Microsoft Azure
Google AppEngine
2. Year of Launch
2006
2009
2008
3. Model Type
IaaS, PaaS
IaaS, PaaS
SaaS, PaaS
4. ComputeServices
5. Storage Services
6. Database Services
SQL Azure
DataStore.
7. Communication
Services
8. Cost Model
Pay-as-you-go, then
subscription[4].
Charged on pay-per-use
basis.
An
applications
service is measured against
billable quotas, xed quotas
and per-minute quotas.
9. Supported
Environment
Operating system
Windows 7, Windows
Server 2008, Windows
Vista
10. Virtualization
Models Used
Hyper-V
also
known
as the Microsoft Azure
Hypervisor used to provide
virtualization of services
Amazon machine
image (AMI), Java, PHP, Python, Ruby
.NET framework.
Continued on Page 16
CSI Communications | January 2015 | 10
www.csi-india.org
Cover
Story
Prerna Lal
Lecturer, Information Management, International Management Institute, New Delhi
Inefficient Silos
Prevalent IT infrastructure environments
of corporations and businesses had many
inefficient data silos and expectedly are
more costly and maintenance-driven.
Further, the frequent addition of back-up
and other redundant products for existing
physical and virtual networks compounded
issues related to silos. Consequently,
IT grapples with backup scalability and
ancillary support for multiple domains and
systems leading to ROI tradeoffs.
To be sure, managing, backing up
and maintain these separate silos of
storage across IT centers and locations
is prohibitively expensive. Because of
lack of adequate abilities for predicting
disaster scenarios, IT department heads
and managers are compelled to overprovision either performance or capacity.
Data protection built into the storage
hardware further limits them. Waste and
inefficiencies add to the costs of delivering
and managing storage.
Unpredictable Scaling
IT organizations or IT departments of
enterprises and businesses have had
to grapple with intense competitive
pressures with the advent of Webbased and cloud-based technologies and
paradigms. The pressure on IT heads and
managers are immense and they have to
perforce respond to the needs of business
rapidly and at times even preemptively.
Growing
organization
needs
and
business-driven activities and programs
necessitates making swift purchase and
procurement decisions about servers
and hardware systems, space required
on the site or offsite and estimated
budgetary requirements. The challenges
are paramount: help create a fairly uid
and scalable environment; leverage
advantages of new technologies; deliver
ways and means to execute business
processes and line/work functions as
seamlessly as possible without breaking
corporate budgets.
The Benets of Web-Scale IT for
Enterprises
Organizations and businesses had
harvested important lessons and certain
best practices from early cloud providers.
CSI Communications | January 2015 | 11
Agility
Automated provisioning is the key to
agility. Apart from providing for incumbent
users, new users are provisioned rapidly.
Changes can also be affected across large
groups of users across locations. Webscale architecture also has the capability
to integrate as well as automate storage
and networking provisioning coupled
with computation. This facilitates fullprovisioning in seconds.
To ensure agility, automating
software updates as and when needed is
a must. Web-scale provides the necessary
Prerna Lal is a Lecturer in Information Management at International Management Institute, New Delhi and a published writer in
journals and publications, both Indian and international. She is an engineer with an MBA degree (IIT-Roorkee). She is a SAP-certied
consultant and has ITIL V3 Foundation-level certicate in IT Service Management. She has more than 13 years of experience
in academics and research with areas of interest being Data Warehousing and Data Mining, Business Analytics, Management
Information System, Software Project Management, IT Service Management, Cyber Law, and Cloud Computing.
www.csi-india.org
Technical
Trends
Dr. Prema K V
Professor, Dept. of Computer Science & Engineering, Manipal Institute of Technology, Manipal
services it provides are presented. This is followed by Internet based utility computing more popularly known as cloud computing.
Pros and cons of adopting cloud computing are discussed followed by its impact on the traditional IT infrastructure. It is discussed
that although cloud computing is nancially advantageous and ensures GREEN IT, there are serious concerns with regard to security,
reliability, lack of control and inter-operability that need to be addressed.
Introduction
Information Technology (IT) has become
an indispensable part of modern day life
be it in our day to day activities or the
business dealings. Multiple advantages
that can be derived by the use of IT has
transformed it from being just a means
of automation into a strategic tool that
enables
organizational
efficiencies
and provides scope for more business
opportunities. Today it is being recognized
as a strategic business enabler[1]. This
has driven more and more organizations
to establish an IT Infrastructure of their
own. However, it is expensive to build and
maintain IT infrastructure.
An IT Infrastructure consists of all
the components that are needed to deliver
IT services to customers. It comprises
of everything that is needed to deliver
cheaper, efficient and effective solutions.
IT Infrastructure can be dened as the
system of hardware, software, facilities
and service components that support
the delivery of business systems and IT
enabled
processes.
It
consists
of
hardware
devices
such
as
computers(client machines or servers),
networking devices(switches or routers),
transmission media(copper or optical
ber), and system software such as
operating systems as well as services
used in common across an organization
irrespective of the project being carried
out. It serves as the foundation upon
which mission/program/project specic
systems and capabilities are built.
Components of IT Infrastructure
The IT Infrastructure ecosystem consists
of seven components that operate in a
coordinated fashion to provide a coherent
IT infrastructure.
The seven components[2] are as
follows:
i.
Computer Hardware: It includes
computers such as client machines,
ii.
iii.
iv.
Communications
Consumer Goods
Education
Healthcare
Information Services
Insurance
Life Sciences
Manufacturing
Retail Technology
about
implementation/infrastructure
used by the service providers.
Components of Cloud Technology
Cloud is a complex set of numerous
components, the prominent ones being
the end user (cloud service consumer),
cloud service provider, data center and a
network[5].
The end users are clients which
interact with the system and demand for
services as per their requirement. They
may be mobile clients, thin clients, or thick
clients. Mobile clients run on laptops,
PDAs, or smart phones. Thin clients have
neither hard drives nor DVD ROM drives
and largely depend on the server. Thick
clients are regular computers, using a web
browser to connect to the cloud and are
self-sufficient in terms of accessories. As
compared to thick clients, thin clients are
less expensive to maintain, and use less
energy.
Cloud service providers are the
agents which host the servers in the cloud
and deliver service to the end users. Ex:
Google, Amazon, IBM, Rackspace.
Data center is a collection of servers
where the applications are residing. It
essentially consists of servers, storage
and network. Servers may be virtualized
as well as geographically dispersed.
The network such as Internet is the
communication channel between the
consumer and the service provider.
Cloud Services
Cloud computing employs a service
driven business model. Cloud services
are broadly classified as Infrastructure
as a Service (IaaS), Platform as a Service
(PaaS), and Software as a Service
(SaaS)[5][10].
www.csi-india.org
Conclusion
For any organization to leverage IT for
its smooth and efficient functioning, IT
infrastructure is a necessity. However, today,
instead of setting up their own dedicated
physical IT infrastructure, organizations can
deploy their business on the cloud. This has
enabled small and medium sized companies
as well as startups to realize their business
dreams with a small budget. However, cloud
service providers need to ensure safety,
reliability and inter-operability as per the
business needs of the users.
References
[1]
[8] h t t p : //s m a l l b u s i n e s s . c h r o n . c o m /
description-effect-cloud-computingtraditional-infrastructure- 69534.html
[9] S Subashini, V Kavitha, A survey on
security issues in service delivery models
of cloud computing, Journal of Network
and Computer Applications, vol. 34, pp.
1-11, Jan 2011, Elsevier Ltd.
[10] Qi Zhang, Lu Cheng, and Raouf Boutaba,
Cloud Computing: state-of-the-art and
research challenges, Journal(Springer) of
Internet Services and Applications, vol.1,
issue 1, pp.7-18, May 2010.
[11] Nabil Sultan, Cloud Computing for
education: A new dawn? International
Journal of Information Management,
Elsevier Limited 2009.
n
[12] www.ibm.com/cloud
Dr. Prema K V is currently working as professor, department of Computer Science & Engineering, Manipal Institute of Technology, Manipal,
Karnataka. She has more than 20 years of teaching experience. Her areas of research interest are soft computing, computer networks and
security. She has published more than 80 research papers in several national and international journals and conferences.
Debranjan Pal has received his M.Tech from the Dept.of Computer Science & Engineering, University of Calcutta,
India. Currently he is working as Assistant Professor, Dept. of CSE, Academy of Technology, W.B., India. His interest
areas are DataStructure, Cryptography and Network Security, Steganography, Mobile Communication, Computer
Network, Cloud Computing.
Sourav Chakraborty has received his M.Tech from the Dept. of Computer Science & Engineering, University of
Calcutta, India. Currently he is working as Assistant Professor, Dept. of CSE, Academy of Technology, W.B., India.
His interest areas are DataStructure, Cryptography and Network Security, Computer Network, Cloud Computing.
Amitava Nag received his M. Tech. degree from University of Calcutta. Currently he is working as an Assistant
Professor and Head in Dept. of IT, Academy of Technology, West Bengal,India and also working towards his PhD at
the Dept. of Engineering & Technological Studies, University of Kalyani. He is member of CSI, IEEE and ACM. His
areas of interest include Image Processing, Information Security, and Data Mining.
www.csi-india.org
Research
Front
XaaS [Anything as a
service]
As IaaS is the most crucial
service that redenes the digital
rm, the article highlights the
issues and challenges with
respect to IaaS.
Infrastructure-as-a-Service
(IaaS)
IaaS is a delivery model
in which three basic subcomponents of services like
[2]
Fig 1: Cloud Computing pluses and minuses
storage, hardware & networks
are delivered along with
own deployment tactics. The onus therefore
associated technologies like
lies on the organisation to choose the most
le systems, virtualization technology and
reliable service providers in case they decide
operating systems Most of the service
to adopt cloud.
providers combine the three models and
For an organisation, cloud computing
give combination of them.
is a model for delivering information
The IaaS provider generally provides
technology services in which resources are
the hardware and administrative services
retrieved from the internet through webneeded to store applications and a
based tools and applications, rather than
platform for running applications. Scaling
a direct connection to a server. Data and
of bandwidth, memory and storage are
software packages are stored in servers.
generally included, and vendors compete
However, cloud computing structure
on the performance and pricing offered
allows access to information as long as an
on their dynamic services. The Service
electronic device has access to the web. This
provider owns the equipments and
type of system allows employees to work
services and they are solely responsible
remotely[3].The features that characterizes
for managing, hosting maintaining services
cloud computing environment are:
uninterrupted. Clients can purchase
Enabled through
contractual basis.
High bandwidth and high speed
IaaS Conguration
internet
There are two primary types of IaaS
Utility computing
provider, namely, On-premises and Off Virtualization
premises service providers. On-Premises
Other services
MaaS [Monitoring as a service]
Consumers View on IaaS
CaaS [Communication as a
Cloud service consumer desires a
service]
secure environment for its application
www.csi-india.org
Data Security
Since
cloud
uses
distributed
architecture, data comes from
different locations and in different
formats. Analyzing these data and
depositing it is a tedious task. Security
challenges can be many like virus/
worm/Trojan attack, malware attack,
unauthorized attacks, DoS attacks so
on and so forth. The security policy
of organisation and service provider
must be mapped to reduce (if not
eliminate) such risks.[6]
Data Loss
At First when organizations use cloud,
data will be mostly stored outside the
organization. Second, data is moving
from one tenant to multi tenant
framework so the threat to data loss/
data leakage increases.[6]
Governance challenges
IT governance
Cloud sets up communication within
and outside the organisation which
requires clear guidelines and IT policies
in place, the escalation path and the
nal authority responsible for taking
decisions in case of ambiguity.[7]
Inter-organizational dependency
In case of public and hybrid
infrastructure services, dependency of
third party can make organization feel
Environmental challenges
[3]
[4]
[5]
[6]
[7]
[8]
[9]
Available at http://www.umsgorgs.
net/category/cloud-computing /
[Accessed 6 Nov 2014]
Investopedia. nd. Cloud Computing.
Available
at
http://www.
investopedia.com/terms/c/cloudcomputing.asp [Accessed 1 Nov
2014]
Kulkarni, G; Sutar, R; Gambhir J., 2012.
Cloud computing-infrastructure as
service-Amazon EC2. International
Journal of Engineering Research and
Applications (IJERA) ISSN: 22489622. Vol. 2, Issue pp.117-125
Tantow, M 2011. What to Consider
Before Choosing An IaaS Provider.
Cloud Times. Available at http://
c l o u d t i m e s . o r g /w p - c o n t e n t /
uploads/2011/02/Infrastructureas-a-Service1.jpg [Accessed 4 Nov
2014].
EY, 2014. Cloud computing adoption
in India Challenges to cloud IaaS
adoption. Available at http://
www.ey.com/IN/en/Industries/
Technology/Cloud-computingadoption-in-India--Challenges-tocloud-IaaS-adoption [Accessed 16
Nov 2014].
Majendran, S 2013. Organizational
Challenges in Cloud Adoption and
Enablers of Cloud Transition Program,
Working Paper CISL# 2013-13.
Ali Khajeh Hosseini; Greenwood,
D; Smith, J W; Sommerville, I The
Cloud Adoption Toolkit: Addressing
the Challenges of Cloud Adoption
in the Enterprise; Cloud Computing
Co-laboratory, School of Computer
Science, University of St Andrews,
UK {akh,dsg22,jws7, ifs} @cs.standrews.ac.uk
F5. 2008. 7 Virtualization Challenges.
Available at http://www.f5.com/
pdf/white-papers/virtualizationpainpoints-wp.pdf. [Accessed 25
Nov 2014]
n
Prof (Dr) D G Jha is currently working as Professor and Area Chairperson - IT at K J Somaiya Institute of Management Studies and
Research. He has over 25 years of experience and has authored a text book in the area of computing concepts and Management
Information System. He is a Ph.D from University of Mumbai. He is also the programme coordinator of MCA. His area of interests
are computing concepts, DBMS, Information systems, and HRIS.
Ms. Kimaya Ambekar is Academic Associate- IT at K J Somaiya Institute of Management Studies and Research, Vidyavihar,
Mumbai. She is a Masters in Computer Applications graduate from University of Mumbai and has two years of academic
experience. Her areas of interests are Cloud computing, security, C# framework.
Research
Front
www.csi-india.org
[2]
[3]
[4]
[5]
Dr. Khalid Raza is an active researcher and currently working as an Assistant Professor at the Department of Computer Science, Jamia Millia
Islamia (Central University), New Delhi, India. He has completed his Bachelors & Masters Degree in Computer Science & Applications and
also cleared National Eligibility Test (NET) & Junior Research Fellow (JRF) in the same subject conducted by University Grants Commission
(UGC), India. He has completed his Ph.D in Computational Biology from Jamia Millia Islamia, New Delhi. He has published more than
10 research articles in refereed international journals, conference proceedings and as book chapters. His research area of interest is soft
computing techniques, articial intelligence, systems biology and bioinformatics. He has received research grants for two Govt. funded
research projects and working as Principal Investigator for both. He is reviewer of several international journals, member of several conference
review committee and delivered several invited talk in national/international conferences/workshops.
www.csi-india.org
Article
usage and development of these systems. Their vivid applications in almost all the sectors of business have attracted bad men too. The
hackers, crackers, hostile countries and dissatised internal employees are always looking at their chances to break through the defense
of any organizations IS and steal the data or information. A good architecture helps in reducing these risks. This paper attempts to nd
relationship among architecture of IS and quality attributes in context to security of information system.
Keywords: security risk, threats, architecture, mapping, attributes.
Introduction
Antivirus and antimalware scanning
software running on desktop computers
are ineffective to catch a suspicious
activity or any disgruntled employee in any
organization. These threats need different
approach, guidelines and regulations. The
Street View application in Google maps
approximately collected 600 Giga bytes
from famous streets and roads of different
countries by special camera attached
vehicles in 2007. Google was then sued
by an American agency but escaped later
by virtue of nonexistence of any law or
guidelines against such an act. Today,
the mobile devices are being rapidly
integrated into enterprises, government
agencies, and even the military. These
devices have sprouted the problem of
internal security risks. These devices hold
valuable, sensitive content and secret
information. A compromised device can
hand over the owners stored credential
and data to attacker. The large scale
processing of information has attracted
the interest of the security community
for its promised ability to analyze and
correlate security-related data efficiently
and at unprecedented scale. This article
discusses the quality attributes and
relates them with the architecture of an
information system.
Mobile Devices Related Security Attacks
Security breaches can cause huge revenue
loss to organizations. McNamara (1998)
has listed the insider threats like proprietary
information theft, accidental or nonmalicious breaches, sabotage, fraud, viruses,
and eavesdropping/snooping as major
risks. These attacks can be premeditated,
deliberate or malevolent. Magklaras and
Furnell (2002) contend that there are four
main categories of insider threats such as
Importance Level
Benet to organization
Awareness about
risk of information
leakage
Highly Important
Highly Important
Architectural Change
Importance level
Effects on security of IS
Very high
Very high
High
High
[2]
High
High
[3]
[4]
Table 3: Architectural change and their eects on IS
Conclusion
This study attempts to relate the
architecture of information system with
Architectural Change
Importance level
Very high
Very high
Improved Availability
Very High
Improved Efficiency
High
Very High
High
Very High
Condentiality is increased
Very High
Condentiality is improved
of IS
[6]
[7]
[8]
[9]
[5]
[10]
Rakesh kumar is working as Assistant Professor in department of computer science, Khalsa college for Women, Amritsar. He is
pursuing his PhD in computer science. His area of research is Software Engineering and Information Security. He has about 17
publications in national and international journals and conferences.
Dr Hardeep Singh is working as Professor in department of computer science and Engineering, Guru Nanak Dev University Amritsar.
He has more than hundred publications in reputed National/ International journals and conferences. He is life member computer
society of India. His area of research is Software Engineering.
www.csi-india.org
Article
Barcode
Barcode is a standard linear/onedimensional (1D) graphical representation
of encoded data (usually numeric) in the
form of parallel lines of various width and
spacing. These Barcodes are machinereadable using optical scanners like
Barcode readers. The Barcode readers
can scan and interpret the Barcode and
turn it into the data which the Barcode
represents and provide this input to
a computer to which it is connected.
Figure 1 shows the Barcode printed on
packages of some retail products. In the
retail scenario, the Barcode is used to
represent a unique identier (usually a
number) corresponding to the product.
This unique identier is printed on the
product in the form of a Barcode. All packs
of the same brand, type and size share the
same unique identier and Barcode. An
example of two packs of same size and
brand sharing the same Barcode can be
seen in Fig. 1. At the sales counter in the
retail store, the sales personnel scan the
Barcode on the product using the Barcode
reader. The Barcode reader inputs the
unique identier to the computer. The
computer fetches the respective details
like the product name, price and discount
(if any) from the product database using
www.csi-india.org
Mr. K.V.N. Rajesh has obtained his B.Tech in Computer Science and Engineering from Jawaharlal Nehru
Technological University in 2005. He obtained his M.Tech in Computer Science and Technology from
Andhra University in 2010. He is working as Senior Assistant Professor in department of information
technology at Vignans institute of information technology, Visakhapatnam since 2005. He is a member of
Computer Society of India. His research interests include Business Intelligence, Location Intelligence and Big
Data and he has published papers in the respective areas. He is also the webmaster of his college website
http://www.vignaniit.com/. He can be reached at kvn.rajesh@gmail.com.
Mr. K.V.N. Ramesh is a M.E in Structural Engineering from Andhra University. He has 14 years of experience
in IT industry with expertise in the area of Data Warehousing and Business Intelligence. He has worked on
UNIX, Oracle, Sybase, Business Objects and OBIEE during these years. He is an Oracle certied professional in
Oracle DW and OBIEE. He is currently working as Project Manager at Tech Mahindra, Visakhapatnam. He can
be reached at kvn_ramesh@yahoo.com.
Article
S Palani Murugan
Assistant Professor, Department of Information Technology, E.G.S Pillay Engineering College, Nagapattinam
www.csi-india.org
Practitioner
Workbench
Wallace Jacob
Senior Assistant Professor, Tolani Maritime Institute, Induri, Talegaon-Chakan Road, Talegaon Dabhade,
Pune, Maharashtra
Programming.Tips()
main()
{
int var1 = 1;
func(var1 ? 20 : -9.8);
var1 = 0;
func(var1 ? 30 : -7.6);
return 0;
}
A sample output of the program is given below:
Within func(double tempvar2), tempvar2 = 20
Within func(double tempvar2), tempvar2 = -7.6
If expr2 and expr3 are of the same type (for instance, int),
then the result is of the same type (i.e. int).
If one operand is an int and the other operand is an unsigned
int, then int is converted into unsigned int.
In short, if expr2 and expr3 are not of the same arithmetic type
(for instance, int and float), then the usual implicit arithmetic
conversion rules apply.
A rank can be assigned to different data types as follows:
short
int
long
long long
oat
double
long double
1
2
3
4
5
6
7
If expr2 and expr3 are not of the same rank, then normally the
lower-ranking operand is promoted to the higher-ranking operand.
In the statement:
func(var1 ? 20 : -9.8);
expr2 is of type int and expr3 is of type double. As per the
above discussion expr2 is promoted to type double and hence
func(double tempvar2) is invoked when the value of var1
is 1.
n
Wallace Jacob is a Senior Assistant Professor at Tolani Maritime Institute, Induri, Talegaon-Chakan Road,
Talegaon Dabhade, Pune, Maharashtra. He has contributed articles to CSI Communications especially in the
Programming.Tips section under Practitioner Workbench.
E-mail:wallace_jacob@yahoo.co.in
Office Contact No:02114 242121
Innovations
in India
www.csi-india.org
Hari Kishore Lead Architect, Software Engineering Group, Tata Consultancy Services (TCS) Hari has 17 years of
experience in the IT industry in Solution envisioning, Architecture development, Product development, enterprise
transformation programs, Process deployment and Large Bid response management. He is an Open Group Master
Certied IT Architect, a TOGAF 9 certied architect and a practicing architect. Hari is currently a Lead Architect
in Software Engineering Group, a software product development unit of TCS. He holds a Master of Technology
degree from Indian Institute of Technology, Kharaghpur, India.
Contact Details: +91 92462 90058; gh.kishore@tcs.com.
Gururaj Anjan Lead Architect, Software Engineering Group, Tata Consultancy Services (TCS) Gururaj Anjan is a
Senior Architect in TCS specializing in Solution Architecture for Business solutions. He has a Bachelors degree
in Computer Science and Engineering. He has architected and managed several business solutions across many
industry domains and geographies. He has been with Solution Engineering Group since its inception and was
instrumental in driving architectural excellence and automating various aspects of product engineering lifecycle.
Currently, he is the Lead Architect for one of the agship business solution at TCS.
Innovators interested in publishing about their work can send a brief write up in 150 words to Dr Anirban Basu, Chairman, CSI Div V, at div5@csi-india.org.
Security Corner
Information Security
Challenge
Several methods exist to defeat the RAPs
which impersonate either AP location or
their credentials. Though, the legitimate
AP is down or not broadcasting, and so
at that place there would be no normal
traffic to compare to. For example, where
a legitimate AP is down and a false AP
drives up, with neither existing together.
In such a case where two systems coexist,
www.csi-india.org
www.watchguard.com/help/
docs/wsm/xtm_11/en-US/index.
html#en-US/wireless/wireless_
rogue_ap_detection_enable_c.ht
ml%3FTocPath%3DWireless%2
520Device%2520Setup%7CRog
ue%2520Access%2520Point%2
520Detection%7C_____1
[3]
J
Milliken,
An
investigation
into
MAC-layer intrusion
detection strategies
for
open-access
wireless
LANs,
Thesis,
Queens
University,
Belfast,
2012.
[4]
V
Nagarajan,
V
Arasan, D Huang,
Fig. 2: (a) Selection of outliers based on the bounds (left) and (b) Tracking of illegitimate changes (right)
Using Power Hoping
to Counter MAC
window upper bound = mean value + std dev * 0.1
are propagating are still observed. Most
Spoong
Attacks
often the methods specied above have
window lower bound = mean value - std dev * 0.1
in
WLAN,
pp-1-5,
overcome the situation but still the APs are
Then the RAP window is appended as
seventh
IEEE
consumer
under research and deliver a wide scope
shown in Fig. 2 (b). These appendors are
communications
for future researchers who are interested
just for the sake of window maintenance
and
networking
in working on Wi-Fi security and catching.
otherwise these RAP window averages are
conference(CCNC),
added and if they exceed the threshold 0
References
Las Vegas, USA, 2010.
then the virus can be easily found.
[1] Jonny Milliken, Valerio Selis and Alan
[5] J Milliken, V Selis, KM Yap, A Marshall,
Marshall, Detection and analysis
Development of device identity
Conclusion
of the Chameleon WiFi access
using WiFi layer 2 management
We know that there is no such xed method
point virus, EURASIP Journal on
dened till now, which can with-stand all
frames for combating rogue APs,
Information Security 2013, Retrived:
attacks in WI-Fi. The IDSs are updated with
international conference on security
http://jis.eurasipjournals.com/
novel methods based on RSSI which helps
and cryptography (SECRYPT13), ppcontent/2013/1/2
a great deal. But notwithstanding this,
488-493, 2013.
[2] Rogue Access Point Detection, http://
attacks such as chameleon program which
n
Mr. Hemant Kumar Saini is a Red hat Certied Engineer. He has recently completed M. Tech in Computer
Science & Engineering from Rajasthan Technical University, Kota in 2014. He has completed his B. Tech in
Information Technology from MLV Government Textile & Engineering College. He is having 2 years of industrial
experience and one year of academic experience. His research interests are Computer Network and Security.
E-mail: hemantrhce@rediffmail.com
Security Corner
www.csi-india.org
Solution
The situation
Conguration Management is a major
hurdle in IT Infrastructure. It is very difficult
in a large organization with conicting
demands and needs to understand and
document what is required for an IT
service. You need to tap too many sources,
users, departments each with differing
priorities and pull it all and get it together
to make sense.
As a result there is mismatch in
capacity planning, loss of scalability, not
enough alignment of IT with strategic
goals. Performance problems, lack of
availability / downtime and unforeseen
failures make the situation even worse.
Within the IT department effective
communication in the language of
business seems to be a major hurdle
which causes problems at both ends. IT
fails to convince and get what they need
from the top and find it challenging to
convince the users that they are in fact
doing their best.
Compliance, governance, metrics,
risk management are other issues. These
are often compounded by poor supplier
Dr. Vishnu Kanhere Dr. Vishnu Kanhere is an expert in taxation, fraud examination, information systems security and
system audit and has done his PhD in Software Valuation. He is a practicing Chartered Accountant, a qualied Cost
Accountant and a Certied Fraud Examiner. He has over 30 years of experience in consulting, assurance and taxation for
listed companies, leading players from industry and authorities, multinational and private organizations. A renowned faculty
at several management institutes, government academies and corporate training programs, he has been a key speaker at
national and international conferences and seminars on a wide range of topics and has several books and publications to his
credit. He has also contributed to the National Standards Development on Software Systems as a member of the Sectional
Committee LITD17 on Information Security and Biometrics of the Bureau of Indian Standards, GOI. He is former Chairman
of CSI, Mumbai Chapter and has been a member of Balanced Score Card focus group and CGEIT- QAT of ISACA, USA. He
is currently Convener of SIG on Humane Computing of CSI and Topic Leader Cyber Crime of ISACA(USA). He can be
contacted at email id vkanhere@gmail.com
Security Corner
Prashant Mali
Cyber Law & Cyber Security Expert, Author, Speaker
IT Act 2000
www.csi-india.org
Conclusion
Seeing one picture can be of worth reading
100 lines of text; better wordings cannot
be there to express the importance of
visualization. There are many visualization
tools available for distinct purposes
as single methodology or tool cannot
survive on specic needs of different
application data. This article may not be
a big deal for getting to know everything
about information visualization in a single
place, yet it can provide some useful facts
www.datameer.com/product/datavisualization.html
[4] Data Visualization: Making Big
Data Approachable and Valuable,
Whitepaper,
SOURCE:
IDG
RESEARCH SERVICES, AUGUST
2012.
[5] Data Visualization Process: http://
o c w. m i t .e d u /re s o u rce s /re s - 6 009-how-to-process-analyze-andvisualize-data-january-iap-2012/
[6] Tools for visualization: http://
www.computerworld.com/
article/2502891/businessi n t e l l i ge n ce /8 - co o l - t o o l s -fo rdata-analysis-visualization-andpresentation.html
n
S.Palani Mururgan is an Assistant Professor, Department of Information Technology of E.G.S Pillay Engineering College,
Nagapattinam. He is passionate about technical writing. He loves to teach Data Mining and Cloud Computing. His
research interests are Soft Computing in Data Mining & Predictive Analysis for Cloud Security. He can be reached at
suyambhu@gmail.com.
Brain Teaser
Crossword
Test your Knowledge on IT Infrastructure
Solution to the crossword with name of rst all correct solution provider(s) will appear in the next issue. Send your answers to CSI
Communications at email address csic@csi-india.org with subject: Crossword Solution - CSIC January 2015
CLUES
ACROSS
2.
7.
10.
11.
12.
16.
17.
19.
20.
23.
24.
25.
26.
28.
30.
32.
DOWN
1.
3.
4.
5.
6.
7.
8.
9.
13.
14.
15.
18.
21.
22.
27.
29.
31.
Congratulations!
NEAR ALL correct answers to December 2014 months
crossword received from the following reader:
Er. Aruna Devi (Surabhi Softwares, Mysore),
www.csi-india.org
Happenings@ICT
H R Mohan
ICT Consultant, Former AVP (Systems), The Hindu & President, CSI
Email: hrmohan.csi@gmail .com
Mobile
attacks
would
deploy
Cryptolocker solutions to lock les on
your mobile devices, seeking a ransom.
Mobile ransomware will break into cloud
accounts and encrypt the data - FireEye.
India ranked 6th largest source of worlds
spam. The US (14%), Russia (6.1%) and
Vietnam (6%) were the three biggest
sources of spam in the 3rd quarter of
2014. - Kaspersky.
A new breed of writers is taking the
self-publishing route, capitalising on the
digital boom and spread of e-books. Selfpublishers can make up to 70% from
royalties as opposed to 5-20% from
traditional publishing.
Domestic demand for IT hardware
and electronics is expected to touch
$400 billion by 2020 of which $320 will
be imported. Make in India to offer big
opportunity for IT manufacturers MAIT.
As on March 2014, India had a total of
1,60,005 ATMs, of which 58% are in
metro and urban centres, 27% in semiurban centres and only 14.5% in rural
centres.
The margins for selling saris can go up to
200% in the online segment compared
with 60% for other categories like apparel,
and consumers durables.
The Internet of Things is pegged to be a
market size of $8.2 trillion by 2020 IDC.
The Internet of Everything (IoE) value at
stake in India over 10 years (20132022)
is $511 billion with private sector value is
$394.4 billion and public sector value is
$116.2 billion. India will have 526 million
Internet users and 1.5 billion networked
devices by 2018 Cisco.
Implementation of free software across
3.2 lakh schools in the country could lead
to savings of more than Rs. 8,000 crore.
Rs. 18 lakh is spent per school under the
Centres ICT in Education scheme
Rahul De, HP Chair Prof., IIMB.
Smart cities should aim at improving
governance Modi.
CSI Reports
From CSI SIG and Divisions
Please check detailed news at:
http://www.csi-india.org/web/guest/csic-reports
SPEAKER(S)
www.csi-india.org
CSI Report
EAIT 2014
19-21 December 2014: Fourth International Conference on Emerging Applications of Information Technology
Organized by Computer Society of India Kolkata Chapter and Hosted by the Indian Statistical Institute Kolkata
CSI News
From CSI Chapters
Please check detailed news at:
http://www.csi-india.org/web/guest/csic-chapters-sbs-news
SPEAKER(S)
GHAZIABAD (REGION I)
Manjeet Singh, Arpit Chadha, Aditya Sharma,
Sivasankaran Laxminarayanan, Manohaur Kumar,
Dr. Sunil Kumar Pandey, Dr. Rabins Porwal, Dr. Umang
Singh, Prof. Rakesh Roshan, Prof. Smita Kansal, Dr. Maya
Ingle, Dr. MP Singh and Swati Mehra
HARIDWAR (REGION I)
Dr. Mayank Aggarwal, Mani Madhukar and Dr. VK Jain
NOIDA (REGION I)
Anuj Agrawal, Tanmoy Chakrabarty, Gopal Krishna 24 November 2014: Seminar on E-Governance Initiatives of GOI and
Agarwal and Dr. RC Tripathi
Implications on Corporate Governance
Mr. Agrawal remarked that governance can be improved only with the help of
IT enabled citizen centric services. Mr. Tanmoy said that with digitization and
e-governance we can remove petty corruption from government services.
Chief Guest CA Gopal Krishna Agarwal said that PMO is entertaining queries
& complaints online and helping nd solutions which was not the case in
past. This government wants to automate the services so that people can
get benet of all Government schemes. Preparation of road map for digital
Noida is to be presented to Noida authorities and constructive suggestions
are being given to MSME task force of Central Government for all-round
development of MSME sector.
Honoring the guest
www.csi-india.org
SPEAKER(S)
NOIDA (REGION I)
Dr. Rajdev Tiwari, Dr. Ajay Kumar, Anuj Agarwal, Deepak 6 December 2014: Seminar on Digital India, opportunities for professional
Kumar, Prof. MN Hoda, RK Vyas, Dr. Somesh Kumar and and organizations
Dr. Tripathi
Seminar was an effort in the direction towards Digital India - project
run by Govt. of India. Mr. Agarwal focused on the meaning of Digital India
and its related opportunities in future. Mr. Deepak Kumar highlighted on
the process of e-voting system run by NSDL for corporates. Prof. Hoda
motivated students to strengthen four necessary pillars for success - four
pillars of SMAC (Social Networking, Mobile Computing, Analytics & Cloud
Computing).
Speaker conducting the Seminar
(REGION-I)
INSTITUTE OF TECHNOLOGY & SCIENCE, GHAZIABAD
(REGION-I)
(REGION-III)
(REGION-V)
(REGION-V)
01-12-2014: At PROJECT EXPO AND OS DAY Dr. G S N Murty HeadCSE, CSI-SBC distributing the prizes to winners
(REGION-VII)
(REGION-VII)
www.csi-india.org
(REGION-VII)
(REGION-VII)
(REGION-VII)
EINSTEIN COLLEGE OF ENGINEERING, TIRUNELVELI
CSI ED EVENTS
WORKSHOP ON MOBILE SECURITY
CONDUCTED BY CSI ED
Now ICT has ubiquitous presence in India and other parts of the world, and it is being applied in various elds such as
Manufacturing, Banking & Finance, Telecom, Healthcare, Hospitality, Transportation, Education, Agriculture, Environment,
eGovernance, eCommerce, and Defence for quality and productivity improvements. India is a major force in the global IT landscape.
ICT is a key driver of our economic development and accounts for about 6.5% of our GDP and provides employments to over 3
million people. The Government of India has recently launched three major initiatives Digital India, Make in India, and Clean India,
in which ICT can and should - play signicant roles. Through this contest, we seek your thoughts, innovative ideas and solutions on
how ICT could support and help these initiatives.
An eligible participant is required to submit the essay on any one of the following topics by 31st January 2015:
1.
2.
3.
Submissions will be assessed by a panel of experts on criteria such as originality, novelty, applicability, potential value of the
proposed idea(s) and clarity and style of presentation.
The contest winners in each stream will be awarded the following prizes & certicates:
For more details & complete brochure, please visit the website: http://goo.gl/FziCmK
For clarications / queries if any, please email us atessay.csi@gmail.com
Theessaycontestis supported by: Dynamic Group, Anjana Software Solutions Pvt. Ltd, HP Networking, Cognitive Platform Solutions
(CPS) Pvt Ltd, Orbit Innovations and CloudReign Technologies.
Please feel free to share this information to all your contacts and encourage participation in this contest.
www.csi-india.org
Region
Chapters
Jhansi
Not Received
Not Received
No FD
Varanasi
Completed
Not Received
No FD
Durgapur
Not Received
Not Received
No FD
Guwahati
Not Received
Not Received
No FD
Chittorgarh
Not Received
Not Received
No FD
Jabalpur
Not Received
Not Received
No FD
Jaipur
Not Received
Not Received
No FD
Balasore
Not Received
Not Received
No FD
Bokaro
Not Received
Not Received
Pending
10
Dhanbad
Not Received
Not Received
No FD
11
Jamshedpur
Not Received
Not Received
No FD
12
Mysore
Not Received
Not Received
No FD
13
New Guntur
Not Received
Not Received
No FD
14
Ongole
Not Received
Not Received
No FD
15
Nagpur
Completed
Not Received
No FD
16
Not Received
No FD
17
Kanyakumari
Not Received
Not Received
No FD
18
Karaikudi
Not Received
Not Received
No FD
19
Kozhikode
Not Received
Not Received
No FD
20
Salem
Not Received
Not Received
No FD
21
Thanjavur
Not Received
Not Received
No FD
22
Hosur
Completed
Not Received
No FD
23
Puducherry
Completed
Not Received
No FD
List of chapters with the pending compliance requirement is reproduced below. These chapters should comply before 25th Jan 2015 to
rectify the pending requirement failing which these chapters will be declared "inoperative" through the February issue of CSIC.
Sr No
Region Chapters
Allahabad
Completed
Pending
Completed
Completed
Completed
Chandigarh
Completed
Pending
Completed
Completed
No FD
Delhi
Completed
Pending
Completed
Completed
Pending
Haridwar
Completed
Pending
Completed
Pending
Pending
Noida
Completed
Pending
Completed
Completed
No FD
Kolkata
Pending
Pending
Completed
Completed
Pending
Indore
Completed
Pending
Completed
Completed
Pending
Ujjain
Completed
Pending
Completed
Pending
No FD
Vadodara
Completed
Pending
Completed
Pending
Pending
10
Cuttack
Completed
Pending
Completed
Completed
No FD
11
Raipur
Completed
Pending
Completed
Pending
No FD
12
Rourkela
Completed
Pending
Completed
Pending
Pending
13
Hyderabad
Completed
Pending
Completed
Completed
No FD
14
Koneru
Completed
Pending
Completed
Completed
No FD
15
Visakhapatnam Completed
Pending
Completed
Completed
Pending
16
Mumbai
Completed
Pending
Completed
Completed
Completed
17
Goa
Completed
Completed
Completed
Pending
Completed
18
Solapur
Completed
Pending
Completed
Pending
No FD
19
Sivakasi
Pending
Pending
Completed
Pending
No FD
Organizing Committee:
Advisory Committee:
www.csi-india.org
CSI Calendar
2015
Date
Contact Information
Prof. K Govinda
Prof. G Jagadeesh
kgovinda@vit.ac.in
gjagadeesh@vit.ac.in
Prof(Dr.) A K Nayak
aknayak@iibm.in
mullayilkannan@gmail.com
17 Jan 2015
Prof. D P Mukherjee / R T
Goswami / Pinakpani Pal,
csical@gmail.com
22 Jan 2015
Prof(Dr.) A K Nayak
aknayak@iibm.in
Ms. Bhawna Sinha
computerdepartment@
patnawo
menscollege.in
31 Jan 2015
Last Date
for essay
submission
essay.csi@gmail.com
First
National
Conference
on
Computational
Technologies-2015
(NCCT15) organised by CSI, Siliguri Chapter,
Dept of Computer
Science and Application, University of North Bengal and CSI Div-V.
http://www.nbucsaevents.in
26 Feb-6 March
2015
gjagadeesh@vit.ac.in
kgovinda@vit.ac.in
Prof. M N Hoda
conference@bvicam.ac.in,
indiacom2015@gmail.com
Amit Joshi
amitjoshiudr@gmail.com
Dr Jaydeep Ameta
jaydeep_ameta@yahoo.com
Prof. A K Nayak
aknayak@iibm.in
Prof. Durgesh Kumar Mishra
drdurgeshmishra@gmail.com
Prashant Richhariya
prashantrichhariya@csitdurg.in
Dr. Y C Bhatt
drycbhatt@hotmail.com
Amit Joshi
amitjoshiudr@gmail.com
www.csi-india.org
Information Technology Minister Ravi Shankar Prasad said India is inviting technology majors
like Samsung and LG to set up manufacturing facilities in the country under 'make in India'
programme.
He said seven lakh kms of optic ber network would be laid in the country in the next three
years. Through optical ber network, we want to connect 2.5 lakh gram panchayats in two and
half to three years," he added.
Shri Ravishankar Prasad
Union Minister of IT
"We hope to see a big explosion in e-commerce, e-health, (and) e-education (sectors)," he said
Telangana Minister for IT K.T. Rama Rao, presenting CSI awards, said the government was
committed to creating an environment where common man can have access to its services
on mobile phones.
It also wanted to make Hyderabad a top notch destination for the IT industry. Chief Minister
wanted priority for the State in the National Optic Fibre Network programme that seeks to
provide broadband connectivity to 2.5 lakh in the country, he said.
Mr. KT Rama Rao,
Telangana Minister for IT
All India Council for Technical Education (AICTE) chairman SS Mantha pointed out that technology can be effectively used to improve
the access to education in India not just at the university but also at the primary and secondary levels and the Union government has
initiated programs such as National Digital Literacy Mission and SWAYAM (Study webs of active-learning for young aspiring minds), to
address this issue.
CSI SIGeGov has conducted eGov Session with delegates coming from most State Govts and presented CSI Nihiliant eGovernance
Awards to the best IT Projects from State Governments.
Day 3 : 14-12-2014
First Session was on Smart Cities & IOT. Moderator was Mr. Ramesh L (VP Products & MD India, Progress Software) and the panlists
were, Mr. Mitesh Agarwal (Country Head - Sales Consulting, Oracle) and Mr. Ramamurthy Prakash Bhamidipati (Head, IoT/ Smartcites
Practise, Paradigm IT).
Second session was Technology Imperatives for Education & Healthcare Moderated by Mr. K Raju (Regional VP CSI) and Key Note
Address was given by Dr. Peter Perycek (Head, Center for eGovernance, Danube University Krems, Austria). Panelists were, Dr. Debraj
Shome (Founder & CEO, MediAngels), Mr. Samir Jain (Founder & CEO, Bodhaguru) and Mr. Asokan Pitchai (SVP, L&D, TalentSprint).
Third Session was Mobile Computing & Social Networking. The
Moderator was Mr. JA Chowdary (Executive Chairman, Talent Sprint &
Conference Chair, CSI-2014). And the panelists were Mr. Raja Ukil (CIO,
Wipro), Mr. Ananth Rao (MD, Focus Ventures) and Mr. V Srinivas Rao
(Founder & CEO, BT&BT).
Central Minister of Science of Technology Mr. Sujana
Chowdary, Malkajigiri MP Mr. Malla Reddy and Director
General of Survey of India Mr. Swarna Subba Rao at the
Valedictory Session of CSI-2014.
If undelivered return to :
Samruddhi Venture Park, Unit No.3,
4th oor, MIDC, Andheri (E). Mumbai-400 093
Gautam Mahapatra
Chairman CSI Hyderabad
Chapter
JA Chowdary
Dr A Goverdan
Raju Kanchibotla
Dr HS Saini
Organizing Committee
Chair
Programme
Committee Chair
Finance Committee
Chair
Dr DD Sarma
Dr Ashok Agarwal
Dr Sateesh Reddy
Sri SV Raghavan
Conference
Planners
Bipin Pendyala
CSI Awards
Ceremony
Ramesh Loganathan
Dr IL Narasimha Rao